Synopsis: Critical: samba security update Advisory ID: SLSA-2015:0251-1 Issue Date: 2015-02-23 CVE Numbers: CVE-2015-0240 -- An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user). (CVE-2015-0240) After installing this update, the smb service will be restarted automatically. -- SL6 i386 libsmbclient-3.6.23-14.el6_6.i686.rpm libsmbclient-devel-3.6.23-14.el6_6.i686.rpm samba-3.6.23-14.el6_6.i686.rpm samba-client-3.6.23-14.el6_6.i686.rpm samba-common-3.6.23-14.el6_6.i686.rpm samba-debuginfo-3.6.23-14.el6_6.i686.rpm samba-doc-3.6.23-14.el6_6.i686.rpm samba-domainjoin-gui-3.6.23-14.el6_6.i686.rpm samba-swat-3.6.23-14.el6_6.i686.rpm samba-winbind-3.6.23-14.el6_6.i686.rpm samba-winbind-clients-3.6.23-14.el6_6.i686.rpm samba-winbind-devel-3.6.23-14.el6_6.i686.rpm samba-winbind-krb5-locator-3.6.23-14.el6_6.i686.rpm SL7 x86_64 libsmbclient-3.6.23-14.el6_6.i686.rpm libsmbclient-3.6.23-14.el6_6.x86_64.rpm libsmbclient-devel-3.6.23-14.el6_6.i686.rpm libsmbclient-devel-3.6.23-14.el6_6.x86_64.rpm samba-3.6.23-14.el6_6.x86_64.rpm samba-client-3.6.23-14.el6_6.x86_64.rpm samba-common-3.6.23-14.el6_6.i686.rpm samba-common-3.6.23-14.el6_6.x86_64.rpm samba-debuginfo-3.6.23-14.el6_6.i686.rpm samba-debuginfo-3.6.23-14.el6_6.x86_64.rpm samba-doc-3.6.23-14.el6_6.x86_64.rpm samba-domainjoin-gui-3.6.23-14.el6_6.x86_64.rpm samba-glusterfs-3.6.23-14.el6_6.x86_64.rpm samba-swat-3.6.23-14.el6_6.x86_64.rpm samba-winbind-3.6.23-14.el6_6.x86_64.rpm samba-winbind-clients-3.6.23-14.el6_6.i686.rpm samba-winbind-clients-3.6.23-14.el6_6.x86_64.rpm samba-winbind-devel-3.6.23-14.el6_6.i686.rpm samba-winbind-devel-3.6.23-14.el6_6.x86_64.rpm samba-winbind-krb5-locator-3.6.23-14.el6_6.x86_64.rpm - Scientific Linux Development Team